MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 872a2f4decf76a5c8cf44a9b017a780847d8b3c50571433232e398ab0931c638. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 15


Intelligence 15 IOCs YARA 1 File information Comments

SHA256 hash: 872a2f4decf76a5c8cf44a9b017a780847d8b3c50571433232e398ab0931c638
SHA3-384 hash: df68c0efbd44b06c4bf9a2298fdd92b53c59f34ba60ee72e74bae6229b6e141ee050567a45271cb4e89e031d3a6edb2b
SHA1 hash: a34f757f5f2bd4763f04206c0d0cd32ab4491117
MD5 hash: 57ec49d438753f3bdfec6a616258b370
humanhash: twelve-ohio-vermont-ceiling
File name:57EC49D438753F3BDFEC6A616258B370.exe
Download: download sample
Signature DCRat
File size:9'132'032 bytes
First seen:2024-05-11 11:30:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d5d9d937853db8b666bd4b525813d7bd (40 x DCRat, 28 x njrat, 5 x RedLineStealer)
ssdeep 196608:ITAJDpNk+Rl4/Xi/yRvyCyKuhBfldGdrmVLaY1rHgu:oAlzJ7yRvyCx+xpgu
Threatray 280 similar samples on MalwareBazaar
TLSH T191963373FD8A0B72DB2E68F2246FE0E29E0431379B2E8909464DEE44375799045B54FB
TrID 83.6% (.EXE) Win32 Executable MS Visual C++ 4.x (134693/65)
4.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.7% (.EXE) Win32 Executable (generic) (4504/4/1)
1.2% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://044913cm.n9shteam2.top/eternalProtectdefault.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
338
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
872a2f4decf76a5c8cf44a9b017a780847d8b3c50571433232e398ab0931c638.exe
Verdict:
Malicious activity
Analysis date:
2024-05-11 11:31:50 UTC
Tags:
dcrat rat backdoor remote stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a window
Searching for the window
Connection attempt
Sending a custom TCP request
Searching for synchronization primitives
Creating a file
Running batch commands
Creating a process with a hidden window
Loading a suspicious library
Using the Windows Management Instrumentation requests
Launching a process
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin packed poison shell32 xorist
Result
Threat name:
DCRat, PureLog Stealer, zgRAT
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates an undocumented autostart registry key
Creates files with lurking names (e.g. Crack.exe)
Creates multiple autostart registry keys
Creates processes via WMI
Drops PE files with benign system names
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Schedule system process
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1439998 Sample: yxyZx5FFRS.exe Startdate: 11/05/2024 Architecture: WINDOWS Score: 100 97 044913cm.n9shteam2.top 2->97 99 Snort IDS alert for network traffic 2->99 101 Multi AV Scanner detection for domain / URL 2->101 103 Antivirus detection for URL or domain 2->103 105 20 other signatures 2->105 13 yxyZx5FFRS.exe 10 2->13         started        17 lsass.exe 2->17         started        20 dllhost.exe 2->20         started        22 8 other processes 2->22 signatures3 process4 dnsIp5 81 C:\Users\user\AppData\Local\...\leetcrack.exe, PE32 13->81 dropped 83 C:\Users\user\...83ursultan 1.16.5 Crack.exe, PE32 13->83 dropped 123 Creates files with lurking names (e.g. Crack.exe) 13->123 24 leetcrack.exe 10 13->24         started        28 Nursultan 1.16.5 Crack.exe 7 13->28         started        95 044913cm.n9shteam2.top 104.21.90.190, 49736, 49737, 49740 CLOUDFLARENETUS United States 17->95 85 C:\Users\user\Desktop\zZaFkuhR.log, PE32 17->85 dropped 87 C:\Users\user\Desktop\wfiwWRdD.log, PE32 17->87 dropped 89 C:\Users\user\Desktop\vzOHPmHK.log, PE32 17->89 dropped 91 19 other malicious files 17->91 dropped 125 Tries to harvest and steal browser information (history, passwords, etc) 17->125 127 Antivirus detection for dropped file 20->127 129 Multi AV Scanner detection for dropped file 20->129 131 Machine Learning detection for dropped file 20->131 file6 signatures7 process8 file9 69 C:\Users\user\AppData\...\portmonitor.exe, PE32 24->69 dropped 71 C:\Users\user\...\3b73a6fa2092a350d795.exe, PE32+ 24->71 dropped 109 Antivirus detection for dropped file 24->109 111 Multi AV Scanner detection for dropped file 24->111 113 Machine Learning detection for dropped file 24->113 30 portmonitor.exe 3 6 24->30         started        34 3b73a6fa2092a350d795.exe 24->34         started        signatures10 process11 file12 93 C:\Webnet\portmonitor.exe, PE32 30->93 dropped 133 Antivirus detection for dropped file 30->133 135 Multi AV Scanner detection for dropped file 30->135 137 Machine Learning detection for dropped file 30->137 36 wscript.exe 1 30->36         started        signatures13 process14 signatures15 107 Windows Scripting host queries suspicious COM object (likely to drop second stage) 36->107 39 cmd.exe 1 36->39         started        process16 process17 41 portmonitor.exe 12 45 39->41         started        45 conhost.exe 39->45         started        file18 73 C:\Users\user\Desktop\zSTNhsZb.log, PE32 41->73 dropped 75 C:\Users\user\Desktop\unYOphdj.log, PE32 41->75 dropped 77 C:\Users\user\Desktop\pAGQMlOv.log, PE32 41->77 dropped 79 26 other malicious files 41->79 dropped 115 Creates an undocumented autostart registry key 41->115 117 Creates multiple autostart registry keys 41->117 119 Uses schtasks.exe or at.exe to add and modify task schedules 41->119 121 2 other signatures 41->121 47 cmd.exe 41->47         started        50 csc.exe 41->50         started        53 schtasks.exe 41->53         started        55 17 other processes 41->55 signatures19 process20 file21 139 Uses ping.exe to sleep 47->139 141 Uses ping.exe to check the status of other devices and networks 47->141 57 conhost.exe 47->57         started        59 chcp.com 47->59         started        61 PING.EXE 47->61         started        67 C:\Windows\...\SecurityHealthSystray.exe, PE32 50->67 dropped 143 Infects executable files (exe, dll, sys, html) 50->143 63 conhost.exe 50->63         started        65 cvtres.exe 50->65         started        signatures22 process23
Threat name:
Win32.Trojan.VBinder
Status:
Malicious
First seen:
2024-04-25 20:39:17 UTC
File Type:
PE (Exe)
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat persistence rat spyware stealer upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Detect ZGRat V1
Modifies WinLogon for persistence
Process spawned unexpected child process
ZGRat
Unpacked files
SH256 hash:
fc45eebea5ae88160a2ac49fe7e027baeee028c4f4b021794726a04ecea8c90b
MD5 hash:
aa6c98cd853bf585a410394fd10817dc
SHA1 hash:
ceab1865997ae2c6e070a9c6adf6b129cf2ad383
Detections:
INDICATOR_EXE_Packed_DotNetReactor
SH256 hash:
c39c4466f622b7320076076ea3eb13fa0f784b9b097dff46d802f905fc39d851
MD5 hash:
a7993e5a520b17fec65435fb4838a08f
SHA1 hash:
18fe6286473a03735e7b701d4bfaf61ad35da7ad
SH256 hash:
872a2f4decf76a5c8cf44a9b017a780847d8b3c50571433232e398ab0931c638
MD5 hash:
57ec49d438753f3bdfec6a616258b370
SHA1 hash:
a34f757f5f2bd4763f04206c0d0cd32ab4491117
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileA
kernel32.dll::GetWindowsDirectoryA
kernel32.dll::GetSystemDirectoryA
kernel32.dll::GetTempPathA
WIN_USER_APIPerforms GUI Actionsuser32.dll::CreateWindowExA

Comments